CVE-2025-40931
CRITICALApache::Session::Generate::MD5 <=1.94 - Info Disclosure
Title source: llmDescription
Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id. Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cryptographic usage. Predicable session ids could allow an attacker to gain access to systems. Note that the libapache-session-perl package in some Debian-based Linux distributions may be patched to use Crypt::URandom.
References (10)
Scores
CVSS v3
9.1
EPSS
0.0003
EPSS Percentile
7.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-338
CWE-340
Status
published
Products (2)
CHORNY/Apache::Session::Generate::MD5
< 1.94
chorny/apache\
< 1.94
Published
Mar 05, 2026
Tracked Since
Mar 05, 2026